Go to primary content
Oracle Product Lifecycle Analytics Security Guide
Release 3.5
E70278-01
  Go To Table Of Contents
Contents

Previous
Previous
 
Next
Next
 

4 Secure Installation and Configuration

This chapter describes recommended deployment topologies and also provides recommendations for installing and configuring a secure setup for your Oracle Product Lifecycle Analytics (OPLA) application.

4.1 Installation Overview

Various database and application components for Oracle Product Lifecycle Analytics (OPLA) can be deployed in different hardware and machine configurations.

The complexity of your deployment configuration depends on the performance criteria set, which in turn, is based on the following:

  • Business requirements

  • Source - that is the Agile PLM database size or the Agile PLM for Process database size

  • Volume of data changes in the source database

  • IT network constraints

  • Infrastructure constraints

Figure 4-1 OPLA Agile PLM Deployment Configuration for a Large Customer Base

Surrounding text describes Figure 4-1 .

To successfully install or upgrade to OPLA, you must be familiar with, or have working knowledge of the following:

  • ODI

  • OBIEE

  • Agile PLM

  • Agile PLM for Process

  • Oracle Database Server

For more information on the privileges needed for different deployment methods, see the Appendix on Oracle PLA Database Schema Privileges on page 37.

4.2 Installation - Prerequisites

The Oracle Product Lifecycle Analytics (OPLA) application comes bundled with a number of third party software. OPLA is tested and certified with latest security patches for the following third party software:

Before installing OPLA you must install and configure the following Oracle products:

  • Oracle Enterprise Database

  • Oracle Data Integrator

  • Oracle Business Intelligence Enterprise Edition


Important:

You should also consult the following Security Guides: Oracle Business Intelligence Suite Enterprise Edition Documentation Library Oracle Database Security Guides